OpenClaw飞书任务管理
v1.0.0飞书任务管理工具,用于创建、查询、更新任务和清单。 **当以下情况时使用此 Skill**: (1) 需要创建、查询、更新、删除任务 (2) 需要创建、管理任务清单 (3) 需要查看任务列表或清单内的任务 (4) 用户提到"任务"、"待办"、"to-do"、"清单"、"task" (5) 需要设置任务负责人、关注...
⭐ 0· 82·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Feishu task management) match the SKILL.md: actions described (create/list/get/patch task and tasklist operations, members, due/completed handling) are coherent with the stated purpose and no unrelated capabilities or binaries are requested.
Instruction Scope
Runtime instructions are narrowly scoped to task and tasklist operations and include concrete required parameters and formats. The SKILL.md asks the agent to use SenderId/current_user_id and a user_access_token (user identity) from message context; it does not instruct reading arbitrary files or sending data to third-party endpoints beyond the implied Feishu API.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk or downloaded during install.
Credentials
The doc explicitly states the tool uses a user_access_token and current_user_id (SenderId) to act as the user, but the registry metadata shows no required env vars. This is not necessarily inconsistent if the platform supplies these tokens/context at runtime, but you should verify how the platform provides the user token and what scope/permissions that token carries.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent installation privileges or modify other skills or system config.
Assessment
This skill appears to be what it says: a Feishu task manager. It operates using the end-user identity (user_access_token / SenderId) to create and modify tasks on behalf of the user — so installing it gives the skill the ability to create, edit, or complete tasks in your Feishu account when invoked. Confirm how your platform supplies the user token (scope and lifetime) and ensure you trust the skill and the agent to act with those privileges. If you want tighter control, limit autonomous invocation or review logs/approvals for actions that modify user data.Like a lobster shell, security has layers — review code before you run it.
latestvk97arcwh7ym7d2gvk6k2nfjkfx83sqyj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
